Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review

T Ali, A Eleyan, T Bejaoui - 2023 International Symposium on …, 2023 - ieeexplore.ieee.org
Significant progress has been made towards developing Deep Learning (DL) in Artificial
Intelligence (AI) models that can make independent decisions. However, this progress has …

Adversarial machine learning in e-health: attacking a smart prescription system

S Gaglio, A Giammanco, G Lo Re, M Morana - International Conference of …, 2021 - Springer
Abstract Machine learning (ML) algorithms are the basis of many services we rely on in our
everyday life. For this reason, a new research line has recently emerged with the aim of …

[PDF][PDF] A trusted medical data sharing framework for edge computing leveraging blockchain and outsourced computation

G Quan, Z Yao, L Chen, Y Fang, W Zhu, X Si, M Li - Heliyon, 2023 - cell.com
Traditional cloud-centric approaches to medical data sharing pose risks related to real-time
performance, security, and stability. Medical and healthcare data encounter challenges like …

Analysis of the impact of white box adversarial attacks in resnet while classifying retinal fundus images

DP Bharath Kumar, N Kumar, SD Dunston… - … Intelligence in Data …, 2022 - Springer
Medical image analysis with deep learning techniques has been widely recognized to
provide support in medical diagnosis. Among the several attacks on the deep learning (DL) …

AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks

F Concone, S Gaglio, A Giammanco, GL Re… - ACM Transactions on …, 2024 - dl.acm.org
In recent years, the widespread adoption of Machine Learning (ML) at the core of complex IT
systems has driven researchers to investigate the security and reliability of ML techniques. A …

Detection of attacks in smart healthcare deploying machine learning algorithms

A Sharma, H Babbar, AK Vats - 2023 4th International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a sort of network that uses a set of protocols and data-sensing
tools to link anything to the Internet. This type of network allows for data exchange as well as …

[PDF][PDF] Predicting facility-based delivery in Zanzibar: The vulnerability of machine learning algorithms to adversarial attacks

YT Tsai, IR Fulcher, T Li, F Sukums, B Hedt-Gauthier - Heliyon, 2023 - cell.com
Background Community health worker (CHW)-led maternal health programs have
contributed to increased facility-based deliveries and decreased maternal mortality in sub …

Trustworthy machine learning in the context of security and privacy

R Upreti, PG Lind, A Elmokashfi, A Yazidi - International Journal of …, 2024 - Springer
Artificial intelligence-based algorithms are widely adopted in critical applications such as
healthcare and autonomous vehicles. Mitigating the security and privacy issues of AI …

Knowledge distillation vulnerability of DeiT through CNN adversarial attack

I Hong, C Choi - Neural Computing and Applications, 2023 - Springer
In the field of computer vision, active research is conducted to improve model performance.
The successful application of transformer models in computer vision has led to the …

Towards Robust Model-Based Reinforcement Learning Against Adversarial Corruption

C Ye, J He, Q Gu, T Zhang - arXiv preprint arXiv:2402.08991, 2024 - arxiv.org
This study tackles the challenges of adversarial corruption in model-based reinforcement
learning (RL), where the transition dynamics can be corrupted by an adversary. Existing …